An approach to optimizing a large-scale microservice deployment for a critical notification system is presented. This paper addresses optimization for three objectives: cloud service cost, cloud resource utilization o...
详细信息
The control of the charging and discharging process of the power lithium battery is the key to its efficient operation. However, there are many complex electrochemical reaction processes, so the power lithium battery ...
详细信息
Spectrum sensing is believed to be a prominent solution to spectrum scarcity caused by the presence of a large number of devices, particularly in Internet of Things (IoT) applications. Providing spectrum access to all...
详细信息
Security in machine learning (ML) is one of the top priorities in many ML-based systems in the field of healthcare, finance, energy, transportation, and cybersecurity. Since developing ML applications requires multidi...
详细信息
ISBN:
(纸本)9781450395946
Security in machine learning (ML) is one of the top priorities in many ML-based systems in the field of healthcare, finance, energy, transportation, and cybersecurity. Since developing ML applications requires multidisciplinary effort, it is important to eliminate knowledge mismatch about security among the team members in the early design phase. In this paper, we present a collection of security patterns for the data-oriented stages in the ML workflow, including data collection, data storage, and data preparation. This provides a concise guidance on how to protect each stage from known threats, as well as a communication vocabulary for different roles to consider security without being security experts.
Indoor ego-motion estimation using millimeter-wave Doppler sensors is challenging due to high levels of outliers, primarily caused by multipath reflections. A standard approach to mitigate these outliers is random sam...
详细信息
This paper presents machine learning based techniques to enhance the performance of inter-cloud data transfers. The inter-cloud systems comprise a "compute cloud" for data processing and a "storage clou...
详细信息
ISBN:
(数字)9781713899310
ISBN:
(纸本)9798350350562
This paper presents machine learning based techniques to enhance the performance of inter-cloud data transfers. The inter-cloud systems comprise a "compute cloud" for data processing and a "storage cloud" for storing the results of the computation. Real world datasets are used to analyze the performance of a proof-of-concept prototype. For the datasets experimented with, using a recurrent neural network or a transformer network to dynamically buffer data can significantly improve data transfer times in comparison to sending data to the storage cloud without buffering it first. The proposed data transfer techniques, the proof-of-concept prototypes, and the insights into the impact of the system and workload parameters on performance are described.
Visible Light Communication (VLC) is a promising enabling technology for the next-generation wireless networks, as it complements radio-frequency (RF)-based communications by providing wider bandwidth, higher data rat...
详细信息
The challenge of minimizing mission response times and the energy consumption of computationally-constrained IoT devices, is becoming increasingly important in Industry 4.0 environments, where mission-critical tasks r...
详细信息
Next location prediction is a discipline that involves predicting a user's next location. Its applications include resource allocation, quality of service, energy efficiency, and traffic man-agement. This paper pr...
Next location prediction is a discipline that involves predicting a user's next location. Its applications include resource allocation, quality of service, energy efficiency, and traffic man-agement. This paper proposes an energy-efficient, small, and low-parameter machine learning (ML) architecture for accurate next location prediction, deployable on modest base stations and edge devices. To accomplish this we ran a hundred hyperparameter experiments on the full human mobility patterns of an entire city, to determine an exact ML architecture that reached a plateau of accuracy with the least amount of model parameters. We successfully achieved a reduction in the number of model parameters within published ML architectures from 202 million down to 2 million. This reduced the total size of the model parameters from 791 MB down to 8 MB. Additionally, this decreased the training time by a factor of four, the amount of graphics processing unit (GPU) memory needed for training by a factor of twenty, and the overall accuracy was increased from 80.16% to 82.54%. This improvement allows for modest base stations and edge devices which do not have a large amount of memory or storage, to deploy and utilize the proposed ML architecture for next location prediction.
Securely managing Internet of Things (IoT) devices is a fundamental challenge. Management protocols for IoT must be scalable and extensible, especially when dealing with device heterogeneity. Because of device resourc...
详细信息
ISBN:
(数字)9798350370997
ISBN:
(纸本)9798350371000
Securely managing Internet of Things (IoT) devices is a fundamental challenge. Management protocols for IoT must be scalable and extensible, especially when dealing with device heterogeneity. Because of device resource limitations in IoT and the sheer size of such networks, traditional management protocols are not well- suited. In this paper, we propose our HTTP/3 publish-subscribe architecture to meet the ends of en masse device configuration, on-boarding, and monitoring. We compared our solution to industry-standard protocols by collecting data from real traffic in networks of up to 500 clients. We found our solution to excel in ease of use and performance, while having slightly higher CPU utilization compared to the other protocols.
暂无评论